Static task
static1
Behavioral task
behavioral1
Sample
eff070eeea8b254653316ac1d3d231f9_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eff070eeea8b254653316ac1d3d231f9_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
eff070eeea8b254653316ac1d3d231f9_JaffaCakes118
-
Size
100KB
-
MD5
eff070eeea8b254653316ac1d3d231f9
-
SHA1
32e8d2a1a41f3d96c0fd9004d9e750d9d032abdb
-
SHA256
e2e9e33f1d8f3d9c30b85d6cd191d881e984a7d2f0f67757131d3c89e01366a9
-
SHA512
786edd2483e1eef0f2b8af13acf0a26d0184c07b95afc4b860b66e49c094527c2517c6c71d7482ce6954082bf41713bb7964d6028a0abc5a5d09a6878c190c0c
-
SSDEEP
1536:SzxcMPqYfQxJVgux399nGBKMDwgWsrsm94x1Vg98uPGUt8bfgwlSU6bCz2gCzuYU:SrqAQxEux8tDisuyRPGUt8E4+ktY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eff070eeea8b254653316ac1d3d231f9_JaffaCakes118
Files
-
eff070eeea8b254653316ac1d3d231f9_JaffaCakes118.exe windows:4 windows x86 arch:x86
f8c67d1ef1af3fcf991210a0a2ad9685
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
GetCurrentThreadId
VirtualAlloc
CreateFileA
lstrcpynA
CreateThread
lstrcatA
lstrcmpiA
GetACP
EnterCriticalSection
HeapAlloc
GetTickCount
GetThreadLocale
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetFileAttributesA
GetVersion
GetModuleHandleA
ExitProcess
GetOEMCP
FindResourceA
GetVersionExA
GetProcessHeap
GetStringTypeW
HeapDestroy
CloseHandle
SizeofResource
GetFileType
SetEndOfFile
GetFullPathNameA
GlobalAlloc
VirtualQuery
GetDiskFreeSpaceA
WriteFile
FindFirstFileA
CompareStringA
FreeResource
LocalAlloc
MulDiv
FormatMessageA
LocalReAlloc
GetUserDefaultLCID
GetCPInfo
GetLocaleInfoA
ExitThread
SetHandleCount
InitializeCriticalSection
CreateEventA
GetDateFormatA
SetErrorMode
GetCommandLineA
ResetEvent
GetLocalTime
SetEvent
GetLastError
LoadLibraryExA
LoadLibraryA
GetCurrentThread
GetSystemDefaultLangID
VirtualAllocEx
GetStdHandle
HeapFree
GetFileSize
LocalFree
LockResource
GlobalFindAtomA
GetEnvironmentStrings
RaiseException
lstrcmpA
lstrcpyA
FindClose
GetProcAddress
GetStringTypeA
GetStartupInfoA
EnumCalendarInfoA
GlobalDeleteAtom
ReadFile
Sleep
SetLastError
DeleteCriticalSection
SetFilePointer
VirtualFree
DeleteFileA
MoveFileExA
lstrlenA
GlobalAddAtomA
SetThreadLocale
WideCharToMultiByte
LoadResource
msvcrt
malloc
memmove
calloc
log
memcpy
advapi32
RegLoadKeyA
RegQueryInfoKeyA
RegQueryValueA
RegDeleteKeyA
user32
OffsetRect
ScreenToClient
SetWindowTextA
GetLastActivePopup
CreateIcon
DispatchMessageA
ShowWindow
ReleaseCapture
InvalidateRect
UnregisterClassA
GetClassNameA
InsertMenuA
SetWindowLongW
CharLowerA
DispatchMessageW
SetClipboardData
GetDesktopWindow
GetForegroundWindow
GetCapture
DrawFrameControl
MapVirtualKeyA
DestroyMenu
IsWindow
LoadCursorA
RegisterWindowMessageA
CharUpperBuffA
GetMessagePos
GetCursor
UpdateWindow
EnumChildWindows
GetParent
LoadKeyboardLayoutA
EnumWindows
SetTimer
GetKeyboardLayout
PeekMessageA
ShowOwnedPopups
SetPropA
FillRect
GetTopWindow
DrawEdge
EqualRect
DeleteMenu
IntersectRect
IsRectEmpty
PeekMessageW
GetWindowThreadProcessId
PtInRect
ScrollWindow
RegisterClassA
EndPaint
CreatePopupMenu
GetScrollPos
SetWindowPlacement
wsprintfA
GetFocus
IsIconic
GetWindowDC
SetClassLongA
ChildWindowFromPoint
BeginPaint
IsChild
ReleaseDC
SetMenuItemInfoA
MoveWindow
GetKeyboardType
SetScrollRange
IsWindowUnicode
GetKeyState
GetScrollRange
GetWindowRect
SetRect
IsWindowEnabled
CallWindowProcA
EmptyClipboard
SetParent
RemovePropA
GetMenuStringA
TranslateMDISysAccel
GetClipboardData
DrawTextA
GetSystemMetrics
TrackPopupMenu
GetKeyboardState
SetFocus
MessageBeep
MessageBoxA
GetDCEx
IsDialogMessageA
CallNextHookEx
EnumThreadWindows
InflateRect
DefWindowProcA
AdjustWindowRectEx
DefMDIChildProcA
InsertMenuItemA
GetScrollInfo
DefFrameProcA
GetActiveWindow
GetMenuState
GetIconInfo
DestroyIcon
GetKeyNameTextA
MapWindowPoints
GetSysColorBrush
GetMenuItemInfoA
GetMenu
DrawIconEx
IsDialogMessageW
ShowScrollBar
LoadBitmapA
GetMenuItemID
RedrawWindow
GetClassInfoA
GetPropA
SetCursor
CharNextA
GetWindow
GetSysColor
SendMessageW
FindWindowA
SetWindowLongA
SetCapture
DrawMenuBar
DrawIcon
WindowFromPoint
GetClientRect
GetSubMenu
RemoveMenu
GetWindowLongW
EnableMenuItem
CheckMenuItem
EnableWindow
PostQuitMessage
RegisterClipboardFormatA
SetScrollInfo
TranslateMessage
PostMessageA
DestroyWindow
GetDlgItem
SetScrollPos
GetWindowLongA
GetCursorPos
UnhookWindowsHookEx
GetClassLongA
CreateWindowExA
IsZoomed
SetWindowsHookExA
CharToOemA
SetForegroundWindow
DrawAnimatedRects
SetMenu
DestroyCursor
GetWindowPlacement
OemToCharA
GetSystemMenu
SystemParametersInfoA
GetWindowTextA
OpenClipboard
WaitMessage
ClientToScreen
SetWindowPos
GetKeyboardLayoutNameA
GetKeyboardLayoutList
FrameRect
KillTimer
CharNextW
GetMenuItemCount
ActivateKeyboardLayout
IsWindowVisible
GetDC
CloseClipboard
LoadStringA
LoadIconA
shlwapi
SHQueryValueExA
SHEnumValueA
Sections
CODE Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE